Rivier College Department of Math and Computer Science. Fibre Channel Technology for Storage Area Networks

Size: px
Start display at page:

Download "Rivier College Department of Math and Computer Science. Fibre Channel Technology for Storage Area Networks"

Transcription

1 Rivier College Department of Math and Computer Science Fibre Channel Technology for Storage Area Networks David Norman CS553A Introduction to Networking Technology 02Dec2001

2 Contents CONTENTS...2 FIGURES...2 INTRODUCTION...3 The problem...3 What is a Storage Area Network?...4 What is Fibre Channel?...4 Why use Fibre Channel for SAN?...4 FIBRE CHANNEL TECHNOLOGY...5 Introduction to Fibre Channel Technology...5 The Fibre Channel Architecture...6 Fibre Channel Equipment...15 FIBRE CHANNEL AS APPLIED TO SAN...17 Introduction to SAN...17 Fibre Channel for SAN...17 CONCLUSION...20 BIBLIOGRAPHY...21 Figures FIGURE 1: TRADITIONAL STORAGE ARCHITECTURE WITH STORAGE DEVICES DIRECTLY ATTACHED TO SERVERS...3 FIGURE 2 : STORAGE AREA NETWORK ARCHITECTURE WITH STORAGE DEVICES ATTACHED TO SERVERS THROUGH A NETWORK...4 FIGURE 3: FIBRE CHANNEL IS DESIGNED FOR CHANNEL & NETWORK CONVERGENCE...5 FIGURE 4: FIBRE CHANNEL TOPOLOGIES....6 FIGURE 5: FIBRE CHANNEL PROTOCOL ARCHITECTURE...7 FIGURE 6: NOMENCLATURE FOR DESCRIBING FC-0 PLANT OPTIONS....8 FIGURE 7: EXAMPLE: REPRESENT A BYTE WITH TC NOMENCLATURE THEN CONVERT TO ITS 10 BIT ENCODED VALUE....9 FIGURE 8: FRAME AND FRAME HEADER FORMATS...10 FIGURE 9: FRAME HEADER FIELD DESCRIPTIONS...11 FIGURE 10: CLASS 1 DATA FLOW. NOTE R_RDY ON CONNECT REQUEST ONLY...12 FIGURE 11: CLASS 2 DATA FLOW. NOTE THE ACK FOR EVERY FRAME. ALSO R_RDY...13 FIGURE 12: CLASS 3 DATA FLOW. NOTE THE LACK OF ACK. ONLY R_RDY FOR LINK MAINTENANCE FIGURE 13: CASCADED ARBITRATED LOOP HUBS FIGURE 14: A SIMPLE SWITCHED FABRIC TOPOLOGY

3 Introduction The problem. Today s applications are rapidly overwhelming the capacity of networks and of storage space. In e- commerce, huge databases support electronic cataloging and ordering while large numbers of customers attempt to simultaneously access the information. As corporations grow and enter the international business environment, enterprise systems maintain corporate information across not only states but countries. To maintain and make available to all users that large amount of information reliably and in a timely manner is challenging to say the least. More and more feature films are incorporating digital effects. Video editing software, Computer Aided Drafting and photo-realistic rendering software are utilized to either modify a film or even create one from scratch. Even a few seconds worth of a film requires hundreds of megabytes of storage space. When teams of 20 animators/digital artists are trying to work on their own piece of a film, the burden on the storage and the network facilities are tremendous. Web sites that serve up streaming audio and or video are consuming more resources as the demand for these services go up. In addition to simply supporting bandwidth and storage increases, corporations now want to be able to safeguard their data. This typically entails making backups of data (to tape) and saving data off the corporate premises. This is an extremely small sample of the applications that are challenging the storage and networking architectures. Traditionally, these applications have been supported by file servers with either large internal disks or disk farms directly attached to the server The disks are typically connected to the server via SCSI (Small Computer System Interconnect). The SCSI standard defines a high throughput parallel interface that is used to connect up to 7 peripherals (including the host adapter card itself) to the computer. Examples of these peripherals are scanners, CD (Compact Disk) players/recorders, digitizers, tape drives and as previously stated hard disks. This architecture has several limitations. The server can only access data on devices directly attached to it. If a server or any part of its SCSI hardware fails, access... to its data is cut off. Also, SCSI supports a finite Client Client Client number of devices, therefore the amount of data a server can access is limited. If more storage space is needed, but Network there is no more room on the SCSI bus, expansion is no longer possible. SCSI, due to its parallel structure, has distance limitations as well. This requires that the storage Server Storage Server Storage be near the servers. These limitations are the driving force behind a new paradigm for data storage and access. Figure 1: Traditional storage architecture with storage devices directly attached to servers. 3

4 What is a Storage Area Network? Enter the Storage Area Network (SAN). A SAN is consists of a network that sits between the servers and the storage devices. Contrast this with the traditional architecture of direct attached storage and you can immediately see the difference. A SAN allows multiple servers to access any storage device. This helps to increase fault tolerance. If a particular server goes down, it does not take down a block of storage. A SAN has greater range than SCSI, that is, the storage devices do not need to be co-located with the servers. This is attributed to the architecture of the network that sits between the servers and the storage. The predominant technology used to implement SANs is Fibre Channel. Server Client Server Client LAN SAN... Storage Client Storage Storage Figure 2 : Storage Area Network architecture with storage devices attached to servers through a network. What is Fibre Channel? Fibre Channel (FC) is a high speed serial interface for connecting computers and storage systems. FC is a mature technology having been approved and continually moderated by the American National Standards Institute (ANSI) T11X3 committee. New additions to the Fibre Channel specifications are continually being added. There is strong industry support for Fibre Channel products. Vendors such as McData, Vixel, Emulex, Qlogic and StorageTek develop Host Bus Adapters, FC-AL Hubs, Fabrics and management software. They work together with solution providers such as Compaq, Dell, HP, IBM and Sun to create entire solutions. Why use Fibre Channel for SAN? Fibre Channel is the predominant technology for implementing SANs today because it does the best job at meeting the requirements of today s applications. FC is fast, currently it supports speed of up to 1Gbps with 2, 4 & 10Gbps in the works. FC, being a network architecture, allows storage devices to be accessed by all servers on the SAN thus improving reliability. It supports several different topologies. The topologies have varying levels of cost to capabilities tradeoffs, thus allowing corporations to start with a small, reliable setup and scale up as needed. It also supports distances up to 10mi via fiber optic cable. This supports the capability of off-site data storage for disaster recovery and high speed local area networking between buildings on a campus or in the vicinity. Fibre Channel is a proven and fielded technology with many companies manufacturing FC components for SANs. 4

5 Fibre Channel Technology Introduction to Fibre Channel Technology Fibre Channel technology is a networking technology which is designed to facilitate high speed data transfer between computer systems and storage devices. It supports several common transport protocols including IP and SCSI. The support for multiple protocols allows FC to merge high-speed I/O with networking functionality in a single package. To understand FC, we must discuss the concept of a network versus a channel. Many networks currently in use are connectionless. Data along with addressing information are bundled into packets and transmitted over a shared medium. This methodology is relatively straight forward to implement and works relatively well. These networks are flexible and can handle both changes in configuration and also varying load. However, it requires a large amount of overhead to get the packets to go to the proper destination with some level of reliability. Reliability is a major concern as evidenced by the current concentration of work in the Quality Of Service (QoS) area. Also, as more users are added to the network and the resources are used up, the timeliness and reliability of correct packet delivery goes down. The concerns that apply to networking are not exactly the same as the concerns that apply to hardware I/O. Specifically the kind of I/O involved with storage devices but also with network hardware as well. The primary concern here is performance. This is where the concept of a channel is appropriate. An I/O channel s purpose is to move data from one end of the link to the other with the least latency. Therefore, an I/O channel is typically hardware intensive with minimal software overhead. The tradeoff here is minimal error correction. In order to achieve this level of performance, channels operate in a very clearly defined domain. Reliability is achieved by minimizing errors by utilizing a rigorous and simple protocol. Therefore, channels are not as flexible in configuration as networks. Fibre Channel is designed to combine the best features of both networks and channels. FC maintains the speed and low overhead of a channel while adding the flexibility (through connectivity) and the longer distances that are characteristic of a network. Channels Networks HW Intensive High Speed Low Latency Short Distance Bullet Proof Elementary Error Correction SW Intensive Great Connectivity Higher Latency Long Distance Fragile High Overhead Error Correction HW Intensive High Data Rates Low Latency No Station Management Great Connectivity Long Distance Channel & Network Convergence Figure 3: Fibre Channel is designed for Channel & Network Convergence 5

6 FC incorporates channel type features such as point-to-point dedicated connections and hardware intensive processing for buffer control, error handling and encoding/decoding. FC incorporates networking type features such as circuit and packet switching and use of data structures to pass control information in the data stream. Other features include full-duplex transmission, support for both optical and copper as a transport medium and the ability to serve as a transport for other protocols, both channel and network. The Fibre Channel Architecture. The generic Fibre Channel network is composed of one or more bi-directional point-to-point channels. The links support 1Gbps (or 100MBps) data rates in each direction. The transport media may be fiber optic cable, copper twisted pair or coax cable. The links in the FC network are between communication ports known as N_ports. N_port stands for Node Port where a node is a device on the FC network. The links may be point-to-point between N_ports or the may be set up as a Fabric. A Fabric consists of several N_Ports connected to a switch. Note: Ports on the switch are called F_ports. Finally, the ports may be daisy chained to form a ring. This is called an Arbitrated Loop (FC-AL). In this configuration the ports are referred to as L_ports. No switch is necessary for FC-AL. These basic layouts may be combined in different ways to create more complex topologies. FC is typically realized in one of 3 topologies: Point-To-Point, Loop or Fabric. The Point-To-Point connection is the simplest type of connection. It can exist by itself or as a subset in a Fabric or Loop topology. An example of a point-to-point topology would be a FC tape unit connected directly to a server. Virtual Workstation Server Storage Subsystem (disk, tape, optical) Switched Fabric Shared storage resources Point-To-Point ArbitratedLoop (FC-AL) Clustering Figure 4: Fibre Channel Topologies. The Arbitrated Loop (FC-AL) topology in its basic form is when L_ports are connected together. The primary advantages are that Loops are easy to setup and maintain and are relatively inexpensive. Additionally, several Loops may be connected via switch to share the load. Disadvantages inherent in a Loop are that Devices on a Loop must share the full bandwidth. The more devices, the less bandwidth is available to each. Also, they are subject to a failure similar to a series circuit. If one node on the loop goes 6

7 down, the entire loop is out. A means of mitigating the effect of a node taking out the entire loop is the use of a FC-AL hub. Circuitry in the hub allows bypassing of failed nodes. An extra side benefit of the hub is that it simplifies wiring. All the wires come into a central point instead of going from node to node. The Fabric topology, in some ways can be considered the ideal FC topology. The Fabric was originally designed to be a generic interface between each node and the physical layer. In theory, it would not matter to the N_port whether it was connected to a loop, hub, switch or a storage device. It would simply work. In current context however, the definition of Fabric has come to mean actual FC switch hardware. Advantages of Fabric topology are high performance, excellent connectivity and redundancy. Also, several different media types may be tied together with a Fabric. On the other hand, Fabrics are relatively costly and configuring and maintaining them is not a simple task. Fibre Channel uses a multi layer protocol architecture along the lines of the 7 Layer OSI Model. There are 5 layers. They are FC-0: Physical layer, FC-1: Encode/Decode layer, FC-2: Framing Protocol/Flow Control, FC-3: Common Services and FC-4: Upper Level Protocol Support. Additionally, there is another layer, which although is not typically considered part of the basic architecture is so important as to warrant mention. This is the FC-AL (Arbitrated Loop) layer. FC-4 HiPPI SCSI IP ATM FC-3 FC-2 FC-1 Common Services Framing Protocol/Flow Control Encode/Decode FC Mbps 266 Mbps 531 Mbps 1062 Mbps Figure 5: Fibre Channel Protocol Architecture. FC-0 Layer The FC-0 level describes the physical interface. The purpose of the physical interface is to take a stream of bits in at the transmitter, send them over the media, receive them and convert them back to bits at the output. Essentially, the physical interface represents a point to point link between two ports. It describes the requirements for the transmitter, the transport media and the receiver hardware. Layer 0 also describes the data rates that are supported by the different media types. The FC-0 layer has an analog interface to the transmission medium and a digital interface to the FC-1 layer. The receiver must always be in an operational state but the transmitter may be on or off for several reasons. One of the safety features of the optical implementation requires the transmitter to stop transmitting if a fiber optic cable is disconnected or broken. This is to prevent any chance of the laser from causing eye damage. The transmitter is responsible for generating the transmission clock. Since the clock is encoded in the data stream, the receiver must be able to decode it. Also, the receiver includes a mechanism to detect the Special Character code known as the comma which is used for bye and word alignment. 7

8 Speed MBps Quadruple speed MBps Double speed MBps Full speed MBps Half speed MBps Quarter speed MBps Eighth speed Distance L - long I - intermediate S - short (actual distances are technology dependent) 100-SM-LL-L Media SM - single mode fiber M5 - multimode 50 um M6 - multimode 62.5 um TV - video cable MI - miniature coax cable TP - twisted pair Transmitter LL - long wave laser (1,300 nm) SL - short wave laser (780 nm) LE - long wave LED EL - electrical Figure 6: Nomenclature for describing FC-0 plant options. FC-1 Layer The FC-1 level describes the means by which user data is encoded for transmission and decoded at the other end. FC uses an 8/10 bit encode/decode scheme originally developed by IBM. This code accomplishes several things. It attempts to minimize errors by equalizing the number of 1 s and 0 s transmitted and not allowing more than 5 consecutive bits of the same type in a row. The code also allows for distinguishing Special Characters and also provides for simplifying byte and word alignment. Additionally, the evening out of 1 s and 0 s also has the effect of minimizing low frequency components in the transmitted signal. This allows for the design of relatively inexpensive transmitter/receiver circuitry which can perform at the required bit error rate (10-12 ). All data transmitted through a Fibre Channel network are sent as 10 bit chunks known as Transmission Characters. The 8/10 bit code used in encoding data for transmission over an FC link is a very powerful technique. 8 bits of user data at a time are translated to a 10 bit word. The encoding scheme ensures that the resulting word has no more than 6 total of one type (either 1 or 0) and that no more than 4 of any one type appear in a row. There is a special case where there are 2 characters of one type followed by 5 characters of the opposite type known as the comma. This feature is important when looking at the characteristic of the transmitted signal. If there are many 1 s, for example, this would appear as a DC voltage. This would make it extremely difficult for the receiver to know where bit boundaries are. If the receiver can t synchronize with the bit stream, it cannot pull the clock from the data stream. If it can t detect the clock, then it will never be able to use the data stream. This feature is the basis for keeping track of the Running Disparity. A TC is composed of a 6 bit subgroup and a 4 bit subgroup. The running disparity is computed on a persubgroup basis and can be positive, negative or even. Positive is when there are more 1s than 0s in a subgroup. Negative is more 0s than ones than 0s. Even is when there are equal amounts of each. For each TC, there is a corresponding value it may be encoded into for both positive and negative running disparities. The transmitter keeps track of the previous running disparity and will choose the appropriate encoding for the TC based upon keeping the running disparity as close to equal as possible. For example, if the previous disparity was negative, the encoding logic would encode the TC using its positive value. Transmission Characters (TC) come in two flavors, Data Characters (DC) and so called Special Characters (SC). Data characters consist of user data encoded into TCs via the 8/10 bit encoding scheme. SCs, used for control, are distinguished from DCs via a special indicator known as the control variable. The notation 8

9 format of a TC is Zxx.y where Z is the control variable, xx is the decimal value of the binary number composed of the bits E, D, C, B and A. The y is composed of the remaining 3 bits, H, G and F. Note: the order is important when doing the converting. For all 256 data values, the encoding scheme produces valid TCs, that is, they meet the qualification of having the proper ratio of 1s to 0s. Of the SCs, only 12 meet that criteria and of the 12, only one is currently used. That is the K28.5 also known as the comma. Once the TC has been transformed to the Zxx.y format, the Z, xx and y components are used to look up their corresponding encoded bit patterns. The following example show the conversion process for the SC K28.5. The process is exactly the same for a DC except that a different set of tables are used for the encoding (this is the purpose of the Z variable). FC-2 byte notation: 0xBC -- Special Character FC-2 bit notation: variable K FC-1 un-encoded: H G F E D C B A Z K Z xx.y FC-1 Reordered for Z E D C B A H G F Zxx.y notation: K Yields the TC: K28.5 To get the encoded version, look up K28 in the 5B/6B encoding table for SCs and look up.5 in the 3B/4B encoding table for SCs. At this point, the hardware would use the running disparity to determine whether to select the positive or negative version. For this example, we will say that the previous disparity was positive. 5B/6B (negative) 3B/4B (positive) FC-1 encoded: a b c d e i f g h j Figure 7: Example: Represent a byte with TC nomenclature then convert to its 10 bit encoded value. Detection of valid characters actually begins in FC-0 where the hardware detects an incoming K28.5 (comma) SC. This character only appears at the beginning of an Ordered Set which is aligned on Transmission Word (TW) boundaries. A TW is a set of 4 TCs. After this character is received, the receiver can now derive byte and word order and is able to decode TCs. Ordered Sets allow the FC-1 level to distinguish data from control information. The type of control information is designated by the 3 TCs directly following a K28.5. Currently, there are 3 types of Ordered Sets: Frame Delimiters, Primitive Signals and Primitive Sequences. Frame delimiters mark the beginning and end of frames and are used to specify the class of connection as well. Primitive Signals are used to indicate the Idle condition (maintain link when no data is flowing) and Receiver Ready (low level flow control). There are also special events used with the Arbitrated Loop topology only. Primitive Sequences relay the state of FC ports such as Not Operational, Offline, Link Reset and Link Response. As with Primitive Signals, there is also a set of sequences reserved for use with the Arbitrated Loop topology. 9

10 Error detection at the FC-1 layer occurs during decoding. There are two types of errors that can occur. The first is when 10 bits cannot be found in the encoding tables. This results in an invalid TC and a code violation is logged. The second type of error is when a valid TC is received, yet it was not the TC that was transmitted. This type of error occurs when due to an error in the transmission hardware, a bit or bits gets flipped resulting in a valid TC, but when the running disparity is computed, it is not the expected value (for example negative following negative instead of negative following positive). FC-2 Layer The FC-2 level is, by far, the most complex layer of the protocol. The major elements of FC-2 are the encapsulation of data using frames, flow control and classes of service. Additionally, FC-2 provides error control. In order to serve as a transport mechanism, FC must be able to encapsulate user data and deliver it to the intended recipient. Frames are the basic package used to encapsulate and transport the data. Generally speaking, there are two basic types of frames, the Data Frame and the Link Control Frame. Both types have the same basic format. A frame is composed of 6 basic sections. Start of Frame 4 bytes Frame Header 24 bytes Optional Header 64 bytes Data Field bytes Payload bytes CRC Error Check 4 bytes End of Frame 4 bytes R_CTL reserved D_ID S_ID TYPE F_CTL SEQ_ID DF_CTL SEQ_CNT OX_ID RX_ID Parameter Frame Header fields: R_CTL: Routing Control D_ID: Destination Identifier S_ID: Source Identifier TYPE: Data structure type F_CTL: Frame Control SEQ_ID: Sequence Identifier DF_CTL: Opt. headers in data field SEQ_CNT: Sequence count OX_ID: Originator Exchange ID RX_ID: Responder Exchange ID Parameter: Frame type dependent Figure 8: Frame and Frame Header formats. The first section is the Start of Frame (SOF). The SOF is comprised of 4 bytes, the comma and 3 bytes indicating the type of connection service. Next is the Frame Header (FH). The FH contains information to control link operations, perform routing, do protocol processing and detect missing or out of order Frames. One of the major functions of the FH is to uniquely identify active Frames. A Frame is uniquely identified by a combination of the following fields: S_ID, D_ID, OX_ID RX_ID, SEQ_ID and SEQ_CNT. A Sequence Qualifier identifies active and open Sequences. The Sequence Qualifier is composed of all the fields listed above except the SEQ_CNT. The SEQ_CNT is used to identify the Frame s location within the Sequence. The Optional Header section can contain up to 4 types of headers. These are 1) Expiration Security Header (how long until Frame should be discarded), 2) Network Header (contains info pertaining to network related ULPs e.g. IP), 3) Association Header (associates Frames with different Exchange Id s) and 4) Device Header (contains other ULP info e.g. SCSI). Next comes the Payload. For a Data Frame, the payload contains the user Data. For a Link Control Frame, the payload is not used. The CRC field is used to verify the data integrity of the FH and Payload. Finally, the End of Frame (EOF) delimiter is an ordered 10

11 set that designates the end of the Frame content. Additionally, the EOF contains information about the validity of the Frame s content, whether to keep the connection open or normally close and if necessary, abort the connection. R_CTL: D_ID: S_ID: TYPE: F_CTL: SEQ_ID: DF_CTL: SEQ_CNT: OX_ID: RX_ID: Parameter: Routing Control - used for categorizing the Frame s function Destination Identifier - address identifier of the Frame s destination port Source Identifier - address identifier of the Frame s source port Data structure type - categorization of the Frame s data Frame Control - control information on Frame handling Sequence Identifier - unique identifier for the Frame s Sequence Opt. headers in data field - indication of optional header inclusion Sequence count - number of the Frame within its Sequence or Exchange Originator Exchange ID - identification of Frame s Exchange at Originator Responder Exchange ID - identification of Frame s Exchange at Responder Relative offset (applicable to Data Frame) -OR- Frame information (applicable to Link Control Frame) Figure 9: Frame Header field descriptions. One logical level up from the Frame is the Sequence. Sequences provide the means for ensuring data integrity of blocks of data that are transmitted and received. A Sequence is composed of a group of related Frames transmitted in one direction. As noted in previous sections, there are several other functions performed by the Start of Frame and End of Frame Ordered Sets. One of these additional functions is to initiate and terminate Sequences. Other information pertaining to the control of Sequences is found in dedicated fields in the Frame Header. Exchanges are groups of related Sequences. Exchanges are used to provide a means for reliably sending Sequences. They do this by detecting and recovering from Sequence errors. Before data is sent across an FC Link, the N_port performs Login procedures. Before a port connects to a Fabric or another port, it is initialized with a default set of operating parameters. These are not typically optimal. The login procedures allow the port to determine what type of environment it resides in and to adjust its operating parameters based on what it finds out. There are login procedures for Fabrics and for other ports. Logging into the Fabric lets the requesting port know 1) what type of topology it is connected to 2) if attached to a Fabric, validates the requesting port s port identifier and 3) if attached to a Fabric, provides the Fabric s current operating parameters and buffer credit value (for flow control) to the requesting port. Logging into another N_port lets the requesting port know 1) the port s current operating parameters and 2) initializes the end-to-end credit value and if Point to Point buffer-to-buffer credit value (for flow control). When a port logs out, its settings are set back to the default values. FC-2 controls the flow of Frames between ports so that receiver buffers are not overrun. A count of the number of buffers available is maintained by the Sequence Initiator (transmitter) and is used to throttle the transmission of Frames. There are two basic types of flow control. These are End to End and Buffer to Buffer. End to End flow control is used in cases of N_port to N_port communications. In this type, the receiver responds to all valid Frames it receives with an ACK Frame. In the case of no buffers available on the receiver, it responds with a Busy Frame. In the case of an invalid Frame, it sends a reject frame. The Sequence Initiator is responsible for maintaining the current amount of credit (EE_Credit_CNT). It decrements the credit count when it sends a Frame and increments it only when an ACK response is received. Buffer to Buffer flow control is used in the case of an N_port talking to a Fabric or in the case of an N_port to N_port connection in a Point to Point topology. In this case each side is responsible for maintaining its own BB_Credit_Count. As with End to End, the BB_Credit_CNT is decremented for every Frame transmitted, but is incremented only when it receives a R_RDY Ordered Sequence (Primitive Signal). This indicates that the receiver has resources available to accept another Frame. FC-2 provides up to 5 Classes of Service (CoS). The different CoS represent different levels of delivery guarantee, bandwidth and connectivity. Different applications require different levels of these services. For 11

12 example, a tape backup might desire a long term dedicated connection (on the order of hours) with high bandwidth whereas a video editing application might require only a temporary connection (on the order of seconds - file transfer, or minutes - scene playback) and less bandwidth. As stated, there are 5 CoS but only 3 have been implemented. Class 1 provides a dedicated connection between two ports including Fabric ports known as the Sequence Initiator and the Sequence Recipient. The connection has the full bandwidth available. Additionally, in most cases, a Class 1 connection does not allow other ports to access either of the participants. This ensures that the ports will not be busy. It also ensures that the Frames all arrive in the order they were sent which speeds up the re-assembly at the end. A Class 1 connection will remain active until either the Sequence Initiator or the Recipient closes it. This Class is good for Fabric type topologies, where the dedicated connection facilitates routing on a per-connection basis instead of a per-frame. This simplifies Fabric operations by reducing its involvement because the N_ports can manage the link control. It also may result in utilizing less of the Fabric s resources. Note: There is a major option to Class 1 known as Intermix. It allows Class 1 and Class 2 Frames to be sent over a Class 1 connection during periods of inactivity. Figure 10: Class 1 data flow. Note R_RDY on Connect Request only. Class 2 provides a multiplexed service which allows for routing and flow control on a Frame by Frame basis. Additionally, it provides acknowledgment of Frame delivery. This allows interleaving of Sequences over the single connection from multiple N_ports. However, it does not guarantee any resources. Frames are forwarded as resources allow. Frames may arrive in a random order depending on traffic conditions such as congestion or in the case of multiple routes. A Class 2 connection may specify in-order-delivery to ensure that Frames arrive in the proper order. Of course there is a tradeoff - the basic service requires more processing at higher levels whereas the in-order-delivery service will demand more of the lower levels. This Class is good for applications that want the transport to ensure data integrity. It is also good for applications that have smaller data transactions with bursty traffic. 12

13 Figure 11: Class 2 data flow. Note the ACK for every Frame. Also R_RDY. Class 3 provides a connectionless service with no acknowledgment. This means that there is no confirmation that a Frame was received by the destination N_port. This also means that there are no indications of Busy or Reject forms of acknowledgment either. This class breaks a major design objective of Fibre Channel which is to not deliver corrupt data (for example a Frame Header error) without some form of indication that it is corrupt. However, despite this and other potential pitfalls, support for a connectionless service is valuable enough that it is included. It essentially sacrifices reliability for performance. It is used in cases where the ULP it is supporting needs to perform its own error detection and correction. It is used widely in Arbitrated Loop (FC-AL) environments. Figure 12: Class 3 data flow. Note the lack of ACK. Only R_RDY for link maintenance. 13

14 The FC-2 layer provides for error detection and recovery at the Sequence level. Error detection at this level is concerned with data integrity within Frames and Sequences and Sequences within Exchanges. The basic types of errors that can occur at this level are corrupt data in the control information in Frames, Frames out of order in a Sequence, dropped Frames, corrupt Sequence control information and Sequences out of order in Exchanges. The basic method used by this layer to detect errors is the time-out mechanism. Initiators and Recipients expect specific events to occur within time-out periods in the delivery of Frames and Sequences. When an error is detected, the Exchange Error Policy (EEP) is used to determine what to do. EEPs specify whether to discard Sequences or to process them with the errors. In some cases, Sequences with certain errors are still valid to the application. Selection of the EEP to be used is negotiated on a connect operation. Once an error has been detected and action has been taken, the last step is to perform recovery. Error recovery happens at the Sequence and Exchange level only, individual Frames are not recovered. This means that if 1 Frame is dropped from a Sequence, the recovery procedure may be (at minimum) to retransmit the entire Sequence. In addition to having FC-2 handle retransmission, the FC-4 or the ULP may control retransmission as well. FC-3 Layer The FC-3 level is not currently fully defined. Its intended purpose is to support common services. The term common services means a service that would utilize multiple N_ports working together on a single node. An example would be striping where data is sent out of a node on several N_ports such as data acquired by a high speed data acquisition process being striped to several RAIDs. This would increase the effective bandwidth by sending data out in parallel. FC-4 Layer The FC-4 level supports the mapping of Upper Level Protocols (ULP) onto Fibre Channel data structures. This allows FC to be a lower level transport mechanism for ULPs. Because of its high speed, low overhead and reliability, FC can be used to carry channel, peripheral interface and networking protocols. There are mappings for several major protocols: SCSI (Small Computer Systems Interface) IPI-3 (Intelligent Peripheral Interface-3) HiPPI (High Performance Parallel Interface) IP (Internet Protocol) - IEEE (TCP/IP) data ATM/AAL5 (ATM adaptation layer for computer data) SBCCS (Single Byte Command Code Set) Generally speaking, the way that FC serves as a transport for ULPs is by mapping the ULP messages (known as Information Units) into FC Sequences and/or Exchanges. The flexibility of Sequences and Exchanges are what make mapping many existing ULPs to FC feasible. An important requirement necessary for transport of ULPs is the ability for the ULP to be able to excersize some level of control at the FC level as in the case of a connectionless service. Following is a brief description of how IP and SCSI are mapped and transported over FC. Transporting IP over Fibre Channel is accomplished by using 2 Information Units. These are the IP datagram and the ARP datagram. The IP datagram actually does the work, moving between nodes on networks using the IP protocol stack while the ARP datagram is used during network configuration to map IP addresses to Media Access Control addresses (used for routing). These datagrams are mapped into Sequences. At this point they are in a format that the FC layers can work with. IP over FC uses a connectionless service. This service is provided by both service Class 2 and 3. Class 2 is typically chosen because it has better performance and reliability than Class 3 even though Class 3 is closer to a true UDP 14

15 than Class 2. IP packets are combined into Sequences for transmitting. Error handling is set up to discard Sequences with no Retransmit upon detecting a Frame error. This allows the IP and TCP levels to control the retransmission. They will also be responsible for controlling the order for the Sequences. Finally, in order to perform address resolution (which in an Ethernet network is normally done by the nameserver), a dedicated ARP server must be set up at a well known address. The ARP server performs the translation of IP addresses to FC addresses so that routing can be achieved. The ARP server must be at the well known location due to the limitations of FC s broadcast ability (it can t locate the nameserver just by broadcasting as is done in an IP network, it must know apriori where it is). A primary use of FC technology is as a transport for SCSI. It is so significant that an acronym has been created for it. FCP stands for Fibre Channel Protocol for SCSI. The transport is accomplished by wrapping SCSI command, response, status and data blocks. SCSI operations have bi-directional communications scheme and thus are suited for operations using FC Exchanges. When transporting SCSI, N_ports are termed FCP_ports. FCP_ports can be a part of any topology although FC-AL is the most prevalent. Once the SCSI operation (ex: read operation) is mapped, the FCP_port originates an Exchange and initiates an FCP_CMND Sequence that transports a SCSI command. This Sequence is then transmitted to the target FCP_port (ex: SCSI disk drive) where it is received and handled. When the operation is finished, the SCSI status is returned to the initiator via an FCP_RSP Sequence. Note that the FCP_CMND and FCP_RSP plus any data transfer sequences for the read make up an Exchange. At this point the FCP_RSP Sequence will contain the EOF Ordered Set which will terminate the Exchange. The SCSI status is passed up to the application that initiated the I/O to indicate that the I/O is complete and is ready for the next request. Error handling for SCSI operations is handled by the normal mechanisms in the SCSI protocol. If a Frame error occurs at the FC level, the entire Exchange is discarded. If this occurs, SCSI is notified and is responsible for requesting a retry if one is required. Fibre Channel Equipment As the market for Fibre Channel networks grows, so too does the industry that manufactures the equipment. Consequently, there is a strong field of manufacturers that build FC equipment. They are continually improving on the products using new technology to increase the speed and reliability of their products. The main components that are utilized in a FC network are Gigabit Interface Converters (GBICs), Host Bus Adapters (HBAs), FC Redundant Arrays of Independent Disks (RAIDs), FC JBODs (Just a Bunch Of Disks), FC-AL Hubs, FC Switches and FC to SCSI Bridges. Gigabit Interface Converters are small transceivers used in interconnecting devices. GBICs can handle a variety of media. This means that a GBIC can be used with optical or electrical cabling. GBICs take an optical cable or electrical cable (such as a DB9 connector) in on one side and have an interface on the other side to connect with other equipment. Most FC equipment such as switches and hubs can accept GBICs. They are simply plugged into ports in the equipment. Advances in laser technology have lead to the replacement of the original lasers (which were of the same type as Compact Disc lasers) with a newer technology Vertical Cavity Surface Emitting Lasers (VCSEL). VCSELs are less difficult to manufacture, consume less power, radiate less heat and are more stable than the older CD type lasers. Another advance is in the overall network management area. GBICs have a specified feature, Serial ID which permits the GBIC to answer queries about identifier information such as serial #, manufacture date, manufacture id etc. GBICs can also provide limited status information such as power consumption. This all depends on the vendor implementation. It also implies that devices such as HBAs, switches or hubs can perform the query. Host Bus Adapters are similar to LAN Network Interface Cards (NICs). It is a card that is connected to the host computer s (either server or workstation) bus. In addition to providing a physical means of connecting a node to the FC network, it also implements the FC-0 through FC-4 layers. At the FC-0 layer, the HBA has connectors that will support various media types. Typically, a given HBA has connector for a single type of media, manufacturers produce different variants of the HBA to support different media. The HBA has transmitter/receiver circuitry, clock and data recovery circuitry, serializing/deserializing circuitry 15

16 and retiming circuitry. FC-1 is realized by the 8/10bit encoder/decoder logic, flow control logic and error detect logic (Ordered Set logic). Also, if the HBA supports FC-AL, it has a Loop Port State Machine. At the FC-2 layer is support for Frame segmentation/reassembly, class of service and credit algorithms (for flow control) and port and fabric login/logout link services. The FC-4 layer is implemented in software drivers provided by the HBA manufacturer. Advances in HBAs are being made in the area of simplifying the physical construction of the board by putting more and more functionality on Application Specific Integrated Circuits as well as offloading some of the functionality onto other components such as FC RAIDs. Redundant Arrays of Independent Disk storage subsystems are a mature technology that provides large amounts of storage and safeguarding of data from loss by specifying methods of storing data to multiple disks. The RAID specification provides for different levels of security versus performance. A RAID enclosure consists of a RAID controller, an internal bus and several disk drives. A FC attached RAID is a RAID which has a FC interface in front of the RAID controller. SCSI-3 commands are sent to the RAID controller via the FC network utilizing the FCP for SCSI ULP. While this is the typical configuration for FC RAIDs, it is also possible to incorporate FC technology behind the RAID controller. This means that there is a small FC-AL network within the RAID enclosure. The RAID controller and the FC enabled disk drives are all nodes on this small internal FC network. RAIDs can be added to the network with minimal impact on resources. For example a RAID only appears as 1 NL_port on a FC-AL network. Since a FC-AL network can have only 126 nodes, adding several FC RAIDs has little impact on available ports while adding a huge amount of storage. Additionally, FC RAIDs are not tied to a specific server as are SCSI RAIDs or JBODs. This makes them very good for clustering applications. FC JBODs (Just a Bunch Of Disks) is essentially a bunch of FC enabled disk drives that are daisy chained to form a FC-AL network. However, the loop is not a complete loop. There are input an output ports which must be connected to a server. Note: JBODs typically have 2 loops for use either as 2 separate loops or for redundancy. Due to their incomplete loop nature, JBODs have a large impact on the FC-AL loop s resources. This is because each disk in the JBOD is counted as an NL_port. JBODs may be equipped with a controller that can configure the disks and the loops. If configured for 2 loops it is possible to divide the drives into separate partitions, one on each loop. Additionally, JBODs can be used with RAID software which can increase the performance and also to provide the redundancy for safeguarding data. However, in this case, the JBOD can only be accessed by the server it is connected to. In general, JBODs are much cheaper than RAIDs but are more limited in their capabilities as well. FC-AL Hubs in principal take the basic loop topology and move it inside a box. One consequence of this is that cabling becomes much simpler. Instead of having cables running between devices, cabling simply runs from the device to the central location of the hub. Hubs have auto bypass circuitry which enable the loop to maintain its integrity if a port is empty or a device fails. This feature also allows the loop topology to be self-configuring. A limitation of the hub/loop implementation is that there can only be 126 NL_ports on the loop. When other hubs are added to the loop, each device on the new hub takes up an available NL_port. With the self-configure ability, FC-AL hubs take some of the burden of configuration of the network administrators. Hubs are required to only implement the capabilities and features found in the FC-0 layer and FC-AL series of specifications. Vendors must meet these basic specifications but then may build in other value added features such as more or less number of ports, fixed media ports (optical or copper) vs GBIC based ports, management features etc. so they may target specific markets from entry level through enterprise class level configurations. FC Switches are high speed routing engines that provide full bandwidth to every port on the switch simultaneously. Switches, unlike hubs, perform services such as Fabric login/logout and flow control at each port. Switches use two methods to route frames, cut-through and store-and-forward. In cutthrough, only the header must be processed in order to determine where the Frame will be sent. The D_ID or destination address is read from the Frame Header and is used to route the Frame. The store-and-forward method buffers the entire Frame before routing it. Switches have latencies in the low 10s of microseconds per Frame range with newer products pushing into the nanosecond range. Switches provide buffering capability to support anywhere from 2 to 16 Frames per port. FC switches support different port types for 16

17 attaching N_ports (nodes), E_ports for fabric expansion and NL_ports for loop attachment. Fabric expansion may be achieved by several means. In one method, switches may be simply cascaded by using an E_port to connect to another switch. This method is a relatively inexpensive means of adding more switched ports but can fall prey to bottlenecking at the E_port. Another method has a switch with all ports configured as E_ports which acts as a dedicated interconnect. This method is more expensive but provides much greater expansion capability with minimal problems due to bottlenecking. As with the other FC products, manufacturers produce equipment with differing levels of capability to target different markets. FC to SCSI Bridges provide a link between a FC network and legacy SCSI devices. A bridge provides a FC interface on one side and several SCSI ports on the other. The bridge must convert the physical signals from whichever FC media they came across to the SCSI bus format. Also they must convert the SCSI-3 serial protocol to the SCSI protocol of the SCSI devices (SCSI-2, SCSI wide, SCSI ultrawide etc.). This equipment is an intermediate solution that will decline as newer native FC devices gain market share. Fibre Channel As Applied to SAN Introduction to SAN A Storage Area Network (SAN) is a high performance network with the primary goal of transferring data between computer systems and storage devices and between multiple storage devices. A SAN consists of a communications infrastructure which provides physical connections and transport capabilities and a management layer which organizes the connections storage devices and computer systems so that data transfer is secure and robust. The SAN provides a common link between multiple servers and storage devices. This is beneficial from a the standpoint of access to data and redundancy for data safeguarding. Having the storage on a network instead of directly attached to a server allows much greater flexibility in scaling server and storage. Additionally, having the storage devices on a dedicated network removes storage specific traffic, such as in the case of tape backup, entirely off the local area network (LAN). This reduces the impact on users and other traffic on the LAN. Scalability allows SANs support small users up to large enterprises. A small FC-AL loop can economically support a small business leaving room to grow. An enterprise covering a large campus may use long distance links, FC-AL loops, multiple switches, large banks of storage accessible by clusters of servers and serverless/network-less backup capabilities. SAN enjoys a large support base with industry standards associations and many manufacturers of networking and storage products. The Storage Network Industry Association and individual vendors in addition to numerous World Wide Web based resources provide a host of information on how to build and manage SANs, what equipment is available and new technology developments applicable to SAN. Fibre Channel for SAN While SANs are not required to use Fibre Channel technology, FC is currently the predominant technology used to implement SANs. There is a large industry base of FC equipment manufacturers. The reason for this is that FC technology provides numerous advantages which enable SANs. The FC-AL topology is the most commonly used configuration for FC SANs. The primary reason for this is because Switched Fabric SANs are significantly more expensive. FC-AL is scalable and therefore can 17

18 suit small to medium size configurations. One of the tradeoffs using FC-AL is price to performance. FC- AL is a shared medium which means all traffic on the network must share the bandwidth. However, large storage configurations are possible by keeping the number of servers down. The servers directly contribute to the level of activity on the loop and therefore the bandwidth degradation can be controlled by controlling the number of them. FC-AL loops may be cascaded to increase the number of ports available for devices. While a true FC-AL loop is very simple to construct, it is not the most desirable loop configuration for implementing SANs. More desirable is the use of a FC Hub star topology with the loop in the center. This configuration can simplify both the physical installation as well as troubleshooting problems. Additionally Hubs have the capability of bypassing empty or bad ports. This feature makes the loop self configuring and allows hot-swapping of devices. This type of configuration is very popular due to its simplicity, flexibility and low cost. Disks Server Loop Hub Loop Hub Server Disks Figure 13: Cascaded Arbitrated Loop hubs. The Fabric topology has had a slow start. This is due to several factors. Switches are very complex devices and thus have required more development time to produce a viable product. This also means that on a perport basis, switches are much more expensive than FC-AL hubs. However, switches are essential for large scale, high speed configurations. They provide a full bandwidth connection for each port. As is the case with hubs, switches have the capability for self-configuration allowing for minimal disruption to SAN operations. 18

19 Fabric Switch Server Server Server Disk arrays Figure 14: A simple Switched Fabric topology. Switches also provide simple nameserver services. Since in a fabric topology, there may be up to 16 million address spaces, performing target location by logging on to all ports on every connection would be impossible. The nameserver is a small database stored in the switch that contains information about nodes in the fabric. This information can be used to more quickly locate devices in the fabric. Being able to quickly locate and connect to a device in a large fabric configuration is essential for implementing SANs. Switches incorporate functionality to be cascaded. This is important for switch networks to be able to be expanded. Switches may be interconnected in a meshed topology. This topology supports multiple paths to all the devices in the mesh. The switch in a fabric topology is capable of supporting all other types of topologies. This adds to the complexity and cost of the fabric topology but in turn is what gives it the flexibility to support many configurations desirable in a SAN. And with introduction of ASICs into switch design, performance and cost are being reduced. Considering that they tie together hundreds of thousands of dollars worth of servers and storage devices, FC interconnect devices, even expensive ones such as switches, are among the least expensive components in a SAN. 19

20 Conclusion Storage Area Networks answer the information infrastructure and application needs of today s corporations both large and small, government or civilian. SANs provide scalability for cost effective configurations as well as expandability. They provide flexibility for ease of implementation and maintenance. SANs are also reliable and redundant, providing integrity and security for data. SANs reduce traffic on standard LANs by moving storage specific traffic off the LAN and onto the SAN. Finally, SANs allow clusters of storage devices to reside in different geographic locations for support of offsite data storage. Fibre Channel is a mature networking technology that is ideally suited for SANs. FC is a gigabit technology supporting speeds up to 1gigabit per second with faster rates being realized in the future. FC supports different transport media such as copper for lower cost lower capability configurations or fiber optics for greater speed and distance at a higher cost. FC products support a SANs need for reliability by incorporating self-configuring capabilities that allow reconfiguring of networks, faulty equipment isolation and maintenance of the network all with minimal to no impact on SAN operations. Both SAN and FC technologies enjoy wide industry support with industry associations, well tested standards and multiple vendors. Storage Area Networks using Fibre Channel technology will be with us for some time to come. 20

Storage Area Network and Fibre Channel Protocol Primer

Storage Area Network and Fibre Channel Protocol Primer Storage Area Network and Fibre Channel Protocol Primer 1 INTRODUCTION...1 2 SATISFYING THE MARKET S INSATIABLE DEMAND FOR STORAGE...1 3 STORAGE AREA NETWORK (SAN) OVERVIEW...2 3.1 SCSI AND SAN DEVICE ADDRESSING,

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Fibre Channel Overview of the Technology. Early History and Fibre Channel Standards Development

Fibre Channel Overview of the Technology. Early History and Fibre Channel Standards Development Fibre Channel Overview from the Internet Page 1 of 11 Fibre Channel Overview of the Technology Early History and Fibre Channel Standards Development Interoperability and Storage Storage Devices and Systems

More information

Using High Availability Technologies Lesson 12

Using High Availability Technologies Lesson 12 Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?

More information

SCSI vs. Fibre Channel White Paper

SCSI vs. Fibre Channel White Paper SCSI vs. Fibre Channel White Paper 08/27/99 SCSI vs. Fibre Channel Over the past decades, computer s industry has seen radical change in key components. Limitations in speed, bandwidth, and distance have

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Fibre Channel over Ethernet in the Data Center: An Introduction

Fibre Channel over Ethernet in the Data Center: An Introduction Fibre Channel over Ethernet in the Data Center: An Introduction Introduction Fibre Channel over Ethernet (FCoE) is a newly proposed standard that is being developed by INCITS T11. The FCoE protocol specification

More information

SCSI The Protocol for all Storage Architectures

SCSI The Protocol for all Storage Architectures SCSI The Protocol for all Storage Architectures David Deming, Solution Technology April 12, 2005 Abstract SCSI: The Protocol for All Storage Architectures This session will appeal to System Administrators,

More information

Storage Networking Foundations Certification Workshop

Storage Networking Foundations Certification Workshop Storage Networking Foundations Certification Workshop Duration: 2 Days Type: Lecture Course Description / Overview / Expected Outcome A group of students was asked recently to define a "SAN." Some replies

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

Network Design. Yiannos Mylonas

Network Design. Yiannos Mylonas Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which

More information

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

STORAGE AREA NETWORKS MEET ENTERPRISE DATA NETWORKS

STORAGE AREA NETWORKS MEET ENTERPRISE DATA NETWORKS 51-20-92 DATA COMMUNICATIONS MANAGEMENT STORAGE AREA NETWORKS MEET ENTERPRISE DATA NETWORKS Lisa M. Lindgren INSIDE Rationale for SANs; SAN Evolution and Technology Overview; Fibre Channel Details; Accommodating

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Storage Area Network

Storage Area Network Storage Area Network 2007 Infortrend Technology, Inc. All rights Reserved. Table of Contents Introduction...3 SAN Fabric...4 Advantages of SAN Solution...4 Fibre Channel SAN vs. IP SAN...4 Fibre Channel

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Managing a Fibre Channel Storage Area Network

Managing a Fibre Channel Storage Area Network Managing a Fibre Channel Storage Area Network Storage Network Management Working Group for Fibre Channel (SNMWG-FC) November 20, 1998 Editor: Steven Wilson Abstract This white paper describes the typical

More information

Network Storage AN ALCATEL EXECUTIVE BRIEF

Network Storage AN ALCATEL EXECUTIVE BRIEF AN ALCATEL EXECUTIVE BRIEF July, 2002 Table of contents 1. Introduction.....................................................................2 2. Network Attached Storage..........................................................2

More information

Chapter 13 Selected Storage Systems and Interface

Chapter 13 Selected Storage Systems and Interface Chapter 13 Selected Storage Systems and Interface Chapter 13 Objectives Appreciate the role of enterprise storage as a distinct architectural entity. Expand upon basic I/O concepts to include storage protocols.

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

Process Control and Automation using Modbus Protocol

Process Control and Automation using Modbus Protocol Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has

More information

Ring Local Area Network. Ring LANs

Ring Local Area Network. Ring LANs Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

More information

STORAGE AREA NETWORKING PROTOCOLS AND ARCHITECTURE

STORAGE AREA NETWORKING PROTOCOLS AND ARCHITECTURE STORAGE AREA NETWORKING PROTOCOLS AND ARCHITECTURE SESSION 1 Morning Schedule 9:00am 10:30am Introduction to Storage Area Networking 10:30am 10:45am 10:50am 12:30pm 12:30pm 1:30pm Storage Terms and Acronyms

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

PCI Express Overview. And, by the way, they need to do it in less time.

PCI Express Overview. And, by the way, they need to do it in less time. PCI Express Overview Introduction This paper is intended to introduce design engineers, system architects and business managers to the PCI Express protocol and how this interconnect technology fits into

More information

The proliferation of the raw processing

The proliferation of the raw processing TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer

More information

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1 Fast Ethernet and Gigabit Ethernet Networks: Fast Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer

More information

High Speed I/O Server Computing with InfiniBand

High Speed I/O Server Computing with InfiniBand High Speed I/O Server Computing with InfiniBand José Luís Gonçalves Dep. Informática, Universidade do Minho 4710-057 Braga, Portugal zeluis@ipb.pt Abstract: High-speed server computing heavily relies on

More information

Redundancy in enterprise storage networks using dual-domain SAS configurations

Redundancy in enterprise storage networks using dual-domain SAS configurations Redundancy in enterprise storage networks using dual-domain SAS configurations technology brief Abstract... 2 Introduction... 2 Why dual-domain SAS is important... 2 Single SAS domain... 3 Dual-domain

More information

IP SAN Best Practices

IP SAN Best Practices IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.

More information

Copyright 2002 Concord Communications, Inc. Network Health is a registered trademark of Concord Communications, Inc. Concord, the Concord logo,

Copyright 2002 Concord Communications, Inc. Network Health is a registered trademark of Concord Communications, Inc. Concord, the Concord logo, $Q2YHUYLHZRI6WRUDJH$UHD1HWZRUNLQJ7HFKQRORJ\ 6$1VYHUVXVFKDQQHOWHFKQRORJLHV6$1FRPSRQHQWV)LEUH &KDQQHO6$1DOWHUQDWLYHV6$1VROXWLRQVWRLQGXVWU\SUREOHPV DQG6$1PDQDJHPHQWXVLQJH+HDOWK,QWURGXFWLRQWR 6WRUDJH$UHD 1HWZRUNLQJ

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

EVOLUTION OF NETWORKED STORAGE

EVOLUTION OF NETWORKED STORAGE EVOLUTION OF NETWORKED STORAGE Sonika Jindal 1, Richa Jindal 2, Rajni 3 1 Lecturer, Deptt of CSE, Shaheed Bhagat Singh College of Engg & Technology, Ferozepur. sonika_manoj@yahoo.com 2 Lecturer, Deptt

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer Data Link Layer Physical

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data. Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

Computer Organization & Architecture Lecture #19

Computer Organization & Architecture Lecture #19 Computer Organization & Architecture Lecture #19 Input/Output The computer system s I/O architecture is its interface to the outside world. This architecture is designed to provide a systematic means of

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

FIBRE CHANNEL OVER ETHERNET

FIBRE CHANNEL OVER ETHERNET FIBRE CHANNEL OVER ETHERNET A Review of FCoE Today ABSTRACT Fibre Channel over Ethernet (FcoE) is a storage networking option, based on industry standards. This white paper provides an overview of FCoE,

More information

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF High Speed Ethernet Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF Hubs and Switches Hubs and Switches Shared Medium Hub The total capacity in the shared medium hub configuration (figure

More information

High-Level Data Link Control

High-Level Data Link Control High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците

Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Why SAN? Business demands have created the following challenges for storage solutions: Highly available and easily

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

Customer Education Services Course Overview

Customer Education Services Course Overview Customer Education Services Course Overview Accelerated SAN Essentials (UC434S) This five-day course provides a comprehensive and accelerated understanding of SAN technologies and concepts. Students will

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

IP SAN: Low on Fibre

IP SAN: Low on Fibre IP SAN: Low on Fibre Smriti Bhagat CS Dept, Rutgers University Abstract The era of Fibre Channel interoperability is slowly dawning. In a world where Internet Protocol (IP) dominates local and wide area

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Evaluation Report. PACS Education. An Introduction to Storage Area Networks (SAN) Crown Copyright 2002. June 2003. MHRA Educational Report MHRA 03055

Evaluation Report. PACS Education. An Introduction to Storage Area Networks (SAN) Crown Copyright 2002. June 2003. MHRA Educational Report MHRA 03055 June 2003 Evaluation Report NUMBER MHRA 03055 PACS Education An Introduction to Storage Area Networks (SAN) MHRA Educational Report MHRA 03055 Crown Copyright 2002 Crown Copyright 50 Crown Copyright 2003

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

Elettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS

Elettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS SERIAL I/O COMMON PROTOCOLS RS-232 Fundamentals What is RS-232 RS-232 is a popular communications interface for connecting modems and data acquisition devices (i.e. GPS receivers, electronic balances,

More information

White Paper Abstract Disclaimer

White Paper Abstract Disclaimer White Paper Synopsis of the Data Streaming Logical Specification (Phase I) Based on: RapidIO Specification Part X: Data Streaming Logical Specification Rev. 1.2, 08/2004 Abstract The Data Streaming specification

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

Fibre Channel Over and Under

Fibre Channel Over and Under Fibre Channel over : A necessary infrastructure convergence By Deni Connor, principal analyst April 2008 Introduction Consolidation of IT datacenter infrastructure is happening in all forms. IT administrators

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface CHPTER 8 Chapter Goals Provide background information about FDDI technology. Explain how FDDI works. Describe the differences between FDDI and Copper Distributed Data Interface (CDDI). Describe how CDDI

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

VERITAS Backup Exec 9.0 for Windows Servers

VERITAS Backup Exec 9.0 for Windows Servers WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS

More information

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like

More information

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

TCP/IP Network Communication in Physical Access Control

TCP/IP Network Communication in Physical Access Control TCP/IP Network Communication in Physical Access Control The way it's done: The security industry has adopted many standards over time which have gone on to prove as solid foundations for product development

More information

Vehicle data acquisition using CAN By Henning Olsson, OptimumG henning.olsson@optimumg.com

Vehicle data acquisition using CAN By Henning Olsson, OptimumG henning.olsson@optimumg.com Vehicle data acquisition using By Henning Olsson, OptimumG henning.olsson@optimumg.com Introduction: Data acquisition is one of the best tools to increase the understanding of vehicle behavior. One can

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

DELL RAID PRIMER DELL PERC RAID CONTROLLERS. Joe H. Trickey III. Dell Storage RAID Product Marketing. John Seward. Dell Storage RAID Engineering

DELL RAID PRIMER DELL PERC RAID CONTROLLERS. Joe H. Trickey III. Dell Storage RAID Product Marketing. John Seward. Dell Storage RAID Engineering DELL RAID PRIMER DELL PERC RAID CONTROLLERS Joe H. Trickey III Dell Storage RAID Product Marketing John Seward Dell Storage RAID Engineering http://www.dell.com/content/topics/topic.aspx/global/products/pvaul/top

More information

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Module 1. Introduction. Version 2 CSE IIT, Kharagpur Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

N_Port ID Virtualization

N_Port ID Virtualization A Detailed Review Abstract This white paper provides a consolidated study on the (NPIV) feature and usage in different platforms and on NPIV integration with the EMC PowerPath on AIX platform. February

More information

TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to

TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to Introduction to TCP Offload Engines By implementing a TCP Offload Engine (TOE) in high-speed computing environments, administrators can help relieve network bottlenecks and improve application performance.

More information

Auspex Support for Cisco Fast EtherChannel TM

Auspex Support for Cisco Fast EtherChannel TM Auspex Support for Cisco Fast EtherChannel TM Technical Report 21 Version 1.0 March 1998 Document 300-TC049, V1.0, 980310 Auspex Systems, Inc. 2300 Central Expressway Santa Clara, California 95050-2516

More information

High Availability Server Clustering Solutions

High Availability Server Clustering Solutions White Paper High vailability Server Clustering Solutions Extending the benefits of technology into the server arena Intel in Communications Contents Executive Summary 3 Extending Protection to Storage

More information

Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.

Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination. Layer Introduction Datagrams and Virtual ircuits Routing Traffic ontrol Main Objective Data delivery from source to destination Node (Router) Application Presentation Session Transport Data Link Data Link

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Chapter 1 Reading Organizer

Chapter 1 Reading Organizer Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small

More information

Storage Networking Building Blocks

Storage Networking Building Blocks 3 Storage Networking Building Blocks A STORAGE NETWORK may be composed of a wide variety of hardware and software products. Software products invariably involve management of some kind: management of logical

More information

Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!

Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere! Interconnection Networks Interconnection Networks Interconnection networks are used everywhere! Supercomputers connecting the processors Routers connecting the ports can consider a router as a parallel

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

More information

Introduction to Networks

Introduction to Networks www.eazynotes.com Maninder Kaur [Page No. 1] Introduction to Networks Short Answer Type Questions Q-1. Which Technologies of this age had led to the emergence of computer network? Ans: The technologies

More information

Gigabit Ethernet: Architectural Design and Issues

Gigabit Ethernet: Architectural Design and Issues Gigabit Ethernet: Architectural Design and Issues Professor of Computer and Information Sciences Columbus, OH 43210 http://www.cis.ohio-state.edu/~jain/ 9-1 Overview Distance-Bandwidth Principle 10 Mbps

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Maximizing Server Storage Performance with PCI Express and Serial Attached SCSI. Article for InfoStor November 2003 Paul Griffith Adaptec, Inc.

Maximizing Server Storage Performance with PCI Express and Serial Attached SCSI. Article for InfoStor November 2003 Paul Griffith Adaptec, Inc. Filename: SAS - PCI Express Bandwidth - Infostor v5.doc Maximizing Server Storage Performance with PCI Express and Serial Attached SCSI Article for InfoStor November 2003 Paul Griffith Adaptec, Inc. Server

More information

Storage Security. Presenter: Himanshu Dwivedi. BlackHat 2003

Storage Security. Presenter: Himanshu Dwivedi. BlackHat 2003 Storage Security Presenter: Himanshu Dwivedi BlackHat 2003 Agenda Introduction Fibre Channel Overview Attacks on Fibre Channel SANs Conclusion Introduction Overview What are SANs? What is Storage Security?

More information

How To Build A Clustered Storage Area Network (Csan) From Power All Networks

How To Build A Clustered Storage Area Network (Csan) From Power All Networks Power-All Networks Clustered Storage Area Network: A scalable, fault-tolerant, high-performance storage system. Power-All Networks Ltd Abstract: Today's network-oriented computing environments require

More information

DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization

DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization New Drivers in Information Storage Data is unquestionably the lifeblood of today s digital organization. Storage solutions remain

More information